Universal Access To All Knowledge
Home Donate | Store | Blog | FAQ | Jobs | Volunteer Positions | Contact | Bios | Forums | Projects | Terms, Privacy, & Copyright
Search: Advanced Search
Anonymous User (login or join us)
Upload
Search Results
Results: 1 through 50 of 268 (0.002 secs)
You searched for: subject:"cryptography"
[1] 2 3 4 5 6     Next    Last
[audio]Unreleased Tracks - Ulan Batur
Tracks only released on the Toldstøj cassette and here.
Keywords: Cryptography
Downloads: 3
[texts]Digit Fast Track Cryptography Vol 07 Issue 11 November 2012 - Digit
Fastrack to Cryptography
Keywords: Cryptography
Downloads: 6
[texts]Les règles de Cicco Simonetta pour le déchiffrement des écritures secrètes - Simonetta, Francesco, 1410-1480
Book from Project Gutenberg: Les règles de Cicco Simonetta pour le déchiffrement des écritures secrètes Library of Congress Classification: Z
Keywords: Cryptography
Downloads: 250
[texts]Cryptography .. - Langie, André, b. 1871-
Bibliography: p. 158. Subtitle on cover [Cryptography ... a study on secret writings]
Keywords: Cryptography
Downloads: 2,125 4.00 out of 5 stars4.00 out of 5 stars4.00 out of 5 stars4.00 out of 5 stars(1 review)
[texts]Die geheimschrift im dienste der Päpstlichen kurie von ihren anfängen bis zum ende des XVI jahrhunderts - Meister, Aloys, 1866- [from old catalog]
Book digitized by Google from the library of Harvard University and uploaded to the Internet Archive by user tpb.
Keywords: Cryptography
Downloads: 1,744
[texts]Cryptography : or, The history, principles, and practice of cipher-writing - Hulme, F. Edward (Frederick Edward), 1841-1909
26
Keywords: Cryptography
Downloads: 2,140
[texts]Cryptomenysis patefacta; or, The art of secret information disclosed without a key. Containing, plain and demonstrative rules, for decyphering all manner of secret writing. With exact methods, for resolving secret intimations by signs or gestures, or in speech. As also an inquiry into the secret ways of conveying written messages, and the several mysterious proposals for secret information, mentioned by Trithemius, &c - Falconer, John, decipherer
Gibson 387
Keywords: Cryptography
Downloads: 889
[texts]Cryptography - Langie, Andr b. 1871-
Bibliography: p. 158
Keywords: Cryptography
Downloads: 3,774
[texts]Die geheimschrift im dienste der Päpstlichen kurie von ihren anfängen bis zum ende des XVI. Jahrhunderts - Meister, Aloys, 1866-1925

Keywords: Cryptography
Downloads: 148
[texts]Shorthand, cryptography, etc.; catalogue of books on shorthand, cryptography, etc. in the library of Robert Todd, esq., Hadley Green, Barnet - Todd, Robert
The metadata below describe the original scanning. Follow the "All Files: HTTP" link in the "View the book" box to the left to find XML files that contain more metadata about the original images and the derived formats (OCR results, PDF etc.). See also the What is the directory structure for the texts? FAQ for information about file content and naming conventions.
Keywords: Shorthand; Cryptography
Downloads: 2,108
[texts]Cryptography : or the history, principles and practice of cipher- writing - Hulme, F. Edward (Frederick Edward), 1841-1909
The metadata below describe the original scanning. Follow the "All Files: HTTP" link in the "View the book" box to the left to find XML files that contain more metadata about the original images and the derived formats (OCR results, PDF etc.). See also the What is the directory structure for the texts? FAQ for information about file content and naming conventions.
Keywords: Cryptography; Ciphers
Downloads: 538
[texts]A treatise on the art of decyphering, and of writing in cypher. With an harmonic alphabet - Thicknesse, Philip, 1719-1792
Book digitized by Google from the library of the University of Michigan and uploaded to the Internet Archive by user tpb.
Keywords: Ciphers; Cryptography
Downloads: 325
[texts]Manual for the solution of military ciphers - Hitt, Parker, b. 1878

Keywords: Ciphers; Cryptography
Downloads: 2,060
[audio]Crypto recipes for your data diet - Pieter Rogaar
This is an audio recording of a talk or event held at OHM2013, in the NoisySquare area. More information about the event can be found at http://ohm2013.org/ and https://noisysquare.com/. This recording is licensed under a WTFPL or CC0 license, whichever you prefer.
Keywords: ohm2013; noisysquare; cryptography
Downloads: 14
[texts]Chaotic keystream generators for additive stream ciphers - Leader, Jeffery J.
Technical report for period January 1993 - April 1993.
Keywords: CRYPTOGRAPHY; SECURE COMMUNICATIONS
Downloads: 79
[texts]Recueil de plusieurs machines militaires et feux artificiels pour la guerre & recreation : auec l'alphabet de Trittemius par laquelle chacun qui sçait escrire peut promptement composer congruement en latin, aussi le moyen d'escrire la nuict á son amy absent / de la diligence de Iean Appier dit Hanzelet, chalcographe et de François Thybourel, me. chyrurgien. - Trithemius, Johannes
19 cm. (4to). [8], 88, 39, [1], 24, 112, [4], 40, [64] p. : 101 [i.e. 99] ill. (engravings)
Keywords: Artillery Military engineering Cryptography
Downloads: 12
[texts]Cryptography In C & C++
Cryptography In C & C++
Keywords: Cryptography In C & C++
Downloads: 46
[texts]Fragmentariu Criptografic Texte Alese - Dan Toma Dulciu
Some articles about cryptography in Romanian culture.
Keywords: Romania; Cryptography; Eminescu
Downloads: 31
[texts]Simon Singh The Code Book ( Teenage Version)
Simon Singh is a popular author and the famous author of the book Fermat's Last Theorem. This is a book he has written on cryptography and makes for a very interesting read.
Keywords: Simon; Singh; Code; Cryptography
Downloads: 433
[texts]Mathematical recreations and essays - Ball, W. W. Rouse (Walter William Rouse), 1850-1925
Arithmetical recreations.--Geometrical recreations.--Mechanical recreations.--Chessboard recreations.--Magic squares.--Unicursal problems.--Kirkman's school-girls problem.--Miscellaneous problems.--The mathematical tripos.--Three classical geometrical problems.--The parallel postulate.--Insolubility of the algebraic quintic.--Mersenne's numbers.--String figures.--Astrology.--Cryptographs and ciphers.--Hyper-space.--Time and its measurement.--Matter and ether theories
Keywords: Geometry; Cryptography; Ciphers
Downloads: 2,560
[texts]The Cryptomenytics and Cryptography of Gustavus Selenus in Nine Books - Gustavus Selenus
Draft of an English translation of the Latin work by Gustavus Selenus (the psuedonym of Augustus, duke of Braunschweig-Lüneburg) written in 1624, translated by John William Henry Walden around 1900. This draft was meant to be published, but it never was. It is currently part of the Fabyan Collection of the rare books collections at the Library of Congress, call number Z103.A95 1900. This file is a scan of a photocopy of the manuscript...
Keywords: cryptography; medieval; translations
Downloads: 1,026
[texts]Steganographia BSB 1608 - Trithemius, Johannes, 1462-1516
Scans from die Bayerische Staatsbibliothek via Google. This is Trithemius's most famous work, written c. 1499; published Frankfurt, 1606., was placed on the Index Librorum Prohibitorum in 1609 and removed in 1900. This book is in three volumes, and appears to be about magicâspecifically, about using spirits to communicate over long distances. Since the publication of the decryption key to the first two volumes in 1606, they have been known to be actually concerned with cryptography and steganog...
Keywords: occult; demonology; steganography; cryptography
Downloads: 975
[texts]Mercury, or, The secret and swift messenger : Shewing, how a man may with privacy and speed communicate his thoughts to a friend at any distance - Wilkins, John, 1614-1672
Held by Gallaudet University Library Deaf Collections and Archives, Washington, D.C. (catalog link: http://catalog.wrlc.org/cgi-bin/Pwebrecon.cgi?BBID=1383691)
Keywords: Cryptography; Gesture; Sign language
Downloads: 484
[texts]An Overview and Analysis of Private and Public Key DNA Cryptography - K.Sireesha ,V.Srujana
with the growth of technological advancements, the threats dealt by a user grow exponentially. Hence security has become a critical issue in data storage and transmission. As traditional cryptographic systems are now vulnerable to attacks, the concept of using DNA Cryptography has been identified as a possible technology that brings forward a new hope for unbreakable algorithms. This paper analyzes the different approaches on DNA based Cryptography
Keywords: Cryptography; SK; AK; PKC; DES; DNA based Cryptography
Downloads: 86
[texts]1201700 - Tyr Stephansen
A decentralized marketplace cryptocurrency wherein nodes act as shops anonymously. An example implementation is given.
Keywords: computer science; cryptography; blockchain technology
Downloads: 10
[texts]17. Applied Towards SECURING DATA IN CLOUD Shorunke Muyiwa Musaddiq - SHORUNKE MUYIWA MUSADDIQ
Clouds are rapidly becoming a platform of choice for hosting increasingly complex application software and services. Among the attractive features they offer are elasticity and pay-as-you-go model, which allow businesses to gain access to vast computing resources with minimum upfront investment, and operational costs. Although a great deal of progress has so far been made with respect to the low-level technological underpinning of the clouds, today’s clouds are still considered to be insuffici...
Keywords: Cloud; Data; Cryptography; Encryption; Security
Downloads: 10
[audio]Samuel-Braunstein-teleportation-part1 - Ian Woolf
Dr Samuel Braunstein about quantum teleportation, why there can never be two Captain Kirks, and how to teleport by fax and truck. Dr Braunstein is professor of informatics at the University of Wales in Bangor, England. THis is part 1 of a two part interview
Keywords: science; teleport; quantum; entanglement; cryptography
Downloads: 386
[texts]Truetrade: An anonymous decentralized marketplace - Tyr Stephansen
A decentralized marketplace cryptocurrency wherein nodes act as shops anonymously. An example implementation is given.
Keywords: computer science; cryptography; blockchain technology
Downloads: 69
[texts]Implementation and efficiency of steganographic techniques in bitmapped images and embedded data survivability against lossy compression schemes - Currie, Daniel L.;Campbell, Hannelore.
Thesis advisor(s): Cynthia E. Irvine, Harold Fredricksen
Keywords: Cryptography; Data compression (Computer science)
Downloads: 250
[texts]Fragmentariu Criptografic - Dan Toma Dulciu
Some studies about cryptographic issues.
Keywords: Romanian Cryptography; Eminescu; N. Grigorescu
Downloads: 1
[texts]Maguire's code of ciphers [microform] : a comprehensive system of cryptography designed for general use and arranged in conformity with the rules and regulations adopted by the International Convention of Telegraph Companies, respecting "secret language telegrams" - Maguire, Charles H. J. (Charles Henry Joseph)
Filmed from a copy of the original publication held by the D.B. Weldon Library, University of Western Ontario
Keywords: Cryptography; Ciphers; Cryptograhie; Chiffres (Cryptographie)
Downloads: 1,885
[movies]CLUG Talk - 27 May 2008 - OpenSSL and Certificates - Stefano Rivera
CLUG Talk: OpenSSL and Certificates Speaker: Stefano Rivera Slides: available here More CLUG Talks
Keywords: CLUG; SSL; OpenSSL; PKI; Cryptography
Downloads: 173
[texts]Combined Implementation of Robust Cryptosystem for Non-invertible Matrices based on Hill Cipher and Steganography
In this paper, we have combined the RobustCryptosystem for Non-invertible matrices based on Hill Ciphertechnique with steganography method in order to securelytransmit text message. The steganography method used is LSBinsertion technique. The encryption and steganographymethods are used subsequently along with two randomizationtechnique: one of XOR the encrypted text and another ofrandomized LSB insertion in any cover image...
Keywords: cryptography; steganography; plaintext; stegoobject; cipher
Downloads: 25
[audio]AntiCryptography - Joel Anderson
How do we communicate with aliens? How do we send them messages that they can understand?
Keywords: SETI; Aliens; cryptography; cryptograms; puzzles
Downloads: 115
[texts]Speculum imaginum veritatis occultæ : exhibens symbola, emblemata, hieroglyphica, ænigmata, omnitam materiæ, quam formæ varietate; exemplis simul, ac præceptis illustratum - Masen, Jakob, 1606-1681
Signatures: A * 2* 3* 4*⁴ ²A B-4A a-d e⁴
Keywords: Signs and symbols; Cryptography; Emblems
Downloads: 603
[audio]Samuel-Braunstein-teleportation-part2 - Ian Woolf
Continuing my discussion with Dr Samuel Brainstein about Quantum teleportation, entanglement, encryption, eavesdropping, and true love. Dr Braunstein is Professor of Informatics at the University of Wales in Bangor, England. This is part two of a two part interview
Keywords: science; teleport; quantum; braunstein; cryptography; encrypt; entanglement
Downloads: 401
[texts]Fish and I - W.T. Tutte

Keywords: Maths; Algebra; Coding and Cryptography; Mathematics
Downloads: 15
[texts]500 YEARS OF ROMANIAN CRYPTOGRAPHY - Dan Toma Dulciu
This is the story of the Romanian Cryptography, from the beginning till now.
Keywords: cryptography; romania; Evstatie; the protopsalt of Putna
Downloads: 143
[texts]17. Eng Unique Information Based Secure RSA Neha Gupta - Neha Gupta, Ravi Kumar Gupta & Shipra Gupta
Computer security is one of the most important parameters considered in any computer system to prevent any data misuse by an unauthorized/ outside intrusion. Cryptography is one technique for data/ computer security. In this paper,           we have proposed a technique for a more secure data transfer which is a alteration to the classical public key crytogarphy method known as Unique Information Based Secure RSA...
Keywords: Cryptography; Public Key; Private Key; Encryption; Decryption
Downloads: 3
[texts]Principles of Applied Mathematics - Lempel-Ziv Notes - Daniel Kleitman;Peter Shor
We now explain the algorithm that Lempel and Ziv gave in a 1978 paper, and generally called LZ78. This is opposed to LZ77, an earlier algorithm which di_ered signi�cantly in the implementation details but is based on the same general idea. This idea is that if some text is not random, a substring that you see once is more likely to appear again than substrings you haven�t seen.
Keywords: Maths; Algebra; Coding and Cryptography; Codes; Mathematics
Downloads: 11
[audio]Martin Hellman at Deusto University
Charla de Martin Hellman en la Universidad de Deusto sobre criptografía. Martin Hellman's talk about cryptography at University of Deusto.
Keywords: Martin Hellman, Deusto, university, cryptography, PKI
Downloads: 182
[texts]HACBPS: A Hierarchical Access Control- Based Proxy Signature
In this paper, we propose a new security  protocol which is styled hierarchical access control-based proxy signature (HACBPS).In hierarchical access control, upper security level users can access some secret information hold by lower security level users, but reverse is not allowed. Whereas in proxy signature, on behalf of the original signer, proxy signer can generate the signature on an arbitrary message...
Keywords: cryptography; security; access control; proxy signature; Poset
Downloads: 49
[movies]EHSM 2014: Peter McMahon - Basics Of Quantum Cryptography - Speaker: Peter McMahon. EHSM music by Frank „netpoet“ Stiegler. EHSM beamsystem by Christoph „gizmo“ Mütze. EHSM logo by Eleonor Neudeau. EHSM font by Mathias Bär.
Exceptional Hardware and Software Meeting 2014 pushing frontiers of open source & DIY DESY Hamburg site, June 27-29 2014 http://ehsm.eu Abstract: Quantum Mechanics is the framework for the laws of nature that are relevant when dealing with very small length- and energy-scales. As has widely been popularized, quantum mechanics leads to rather counterintuitive behavior when we consider small (and in special circumstances, sometimes even large) numbers of atoms...
Keywords: EHSM; quantum mechanics; quantum cryptography; theory
Downloads: 33
[texts]54
Extensive use of Wireless Sensor Networks is givingrise to different types of threats in certain commercial andmilitary applications. To protect the WSN data communicationagainst various threats appropriate security schemes areneeded. However, WSN nodes are resource constrained, withrespect to limited battery energy, and limited computationaland memory available with each WSN node. Hence, thesecurity model to be used in WSN’s should use minimalresources to the extent possible and it should als...
Keywords: WSN; Cryptography; ECC; Koblitz’s encoding
Downloads: 12
[movies]Eben Moglen + Bruce Schneier - Internet Society New York Chapter
Bruce Schneier in conversation with Eben Moglen at Columbia Law School on December 12 2013.
Keywords: NSA; surveillance; Snowden; security; privacy; cryptography; Internet
Downloads: 1,822
[texts]An Intelligent System for Secured Authentication using Hierarchical Visual Cryptography-Review
This paper introduces the idea of hierarchical visualcryptography. Authentication is the important issue over theinternet. This paper describes a secured authenticationmechanism with the help of visual cryptography. Visualcryptography simply divides secret information in to numberof parts called shares. These shares are further transmittedover the network and at the receiving end secrets are revealedby superimposition...
Keywords: Visual cryptography; secret sharing; shares; authentication
Downloads: 88
[texts]3. A Behaviour Of RSA.full
RSA cryptographic algorithm used to encrypt and decrypt the messages for the citation of message in user’s Communication over the secure transmission channel like internet. it will also throw some light on the flaws of some otherpublic key cryptographic algorithms in comparison to RSA algorithm. RSA algorithm will be used to generate key pairs (private key and public key), which are generated using 19 digit prime value, which will be used to encrypt and decrypt the messages...
Keywords: Cryptography; RSA; Big Integer; Secure Communication Channel
Downloads: 56
[movies]Ben Martin - Cryptography
Ben Martin could teach the da Vinci coders a thing or two. He's interested In cryptography, the study of secret codes. In this video he tells us a little bit about its history (the Romans were into it way back in Julius Caesar's day). Ben also talks about the everyday uses for cryptography, including cash machines and online Internet transactions with credt cards.
Keywords: Mathematics; University of Auckland; Mathsreach; Cryptography
Downloads: 291
[texts]Number Theory Algorithms - Raman V
Primality Testing, Integer Factorization, Discrete Logarithms
Keywords: prime numbers; prime factorization; discrete logarithm; cryptography
Downloads: 568
[texts]The mathematical and philosophical works of the Right Reverend John Wilkins ... to which is prefix'd the author's life, and an account of his works - Wilkins, John, 1614-1672
Various paging
Keywords: Science; Plurality of worlds; Mechanics; Cryptography
Downloads: 696
[1] 2 3 4 5 6     Next    Last
Advanced search

Group results by:

> Relevance
Mediatype
Collection

Related mediatypes

texts
audio
movies

Terms of Use (10 Mar 2001)